A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z **, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Deep AI enabled ubiquitous wireless sensing: A survey

C Li, Z Cao, Y Liu - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
With the development of the Internet of Things (IoT), many kinds of wireless signals (eg, Wi-
Fi, LoRa, RFID) are filling our living and working spaces nowadays. Beyond communication …

Safeear: Content privacy-preserving audio deepfake detection

X Li, K Li, Y Zheng, C Yan, X Ji, W Xu - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Text-to-Speech (TTS) and Voice Conversion (VC) models have exhibited remarkable
performance in generating realistic and natural audio. However, their dark side, audio …

" Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

E Wenger, M Bronckers, C Cianfarani, J Cryan… - Proceedings of the …, 2021 - dl.acm.org
Advances in deep learning have introduced a new wave of voice synthesis tools, capable of
producing audio that sounds as if spoken by a target speaker. If successful, such tools in the …

Vocalprint: exploring a resilient and secure voice authentication via mmwave biometric interrogation

H Li, C Xu, AS Rathore, Z Li, H Zhang, C Song… - Proceedings of the 18th …, 2020 - dl.acm.org
With the continuing growth of voice-controlled devices, voice metrics have been widely used
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …

Your microphone array retains your identity: A robust voice liveness detection system for smart speakers

Y Meng, J Li, M Pillari, A Deopujari, L Brennan… - 31st USENIX Security …, 2022 - usenix.org
Though playing an essential role in smart home systems, smart speakers are vulnerable to
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Voice in ear: Spoofing-resistant and passphrase-independent body sound authentication

Y Gao, Y **, J Chauhan, S Choi, J Li… - Proceedings of the ACM on …, 2021 - dl.acm.org
With the rapid growth of wearable computing and increasing demand for mobile
authentication scenarios, voiceprint-based authentication has become one of the prevalent …

WavoID: Robust and secure multi-modal user identification via mmWave-voice mechanism

T Liu, F Lin, C Wang, C Xu, X Zhang, Z Li… - Proceedings of the 36th …, 2023 - dl.acm.org
With the increasing deployment of voice-controlled devices in homes and enterprises, there
is an urgent demand for voice identification to prevent unauthorized access to sensitive …

Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array

Z Li, C Shi, T Zhang, Y **e, J Liu, B Yuan… - Proceedings of the 2021 …, 2021 - dl.acm.org
With the popularity of intelligent audio systems in recent years, their vulnerabilities have
become an increasing public concern. Existing studies have designed a set of machine …